A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Access Policy Consolidation for Event Processing Systems
2013
2013 Conference on Networked Systems
Each incoming event stream can be protected by the specification of an access policy and is enforced by algorithms for access consolidation. ...
This paper presents a finegrained access management for complex event processing. ...
Grau, and the reviewers for their helpful comments. ...
doi:10.1109/netsys.2013.18
dblp:conf/kivs/SchillingKRR13
fatcat:mgnryprd45dwlnxgtohffxm7mu
Access Policy Consolidation for Event Processing Systems
2014
unpublished
Using the access-policy every incoming event can be secured. We can increase the processing of events by calculating the measure of obfuscation values for events. ...
Calculate the threshold for obfuscation as one of the part of access-policy and avoid the accessrequirements and events will be delivered more reliable. ...
We measure the threshold for obfuscation for attributes of events in every Correlation process obfuscation of attributes of events are produced is determined by proposed of access-policy consolidation ...
fatcat:3fxaahgbhvd43hdjkbpxpg2vie
INTERNATIONAL JOURNAL OF MERGING TECHNOLOGY AND ADVANCED RESEARCH IN COMPUTING A Novel Method for Access Policy Consolidation for Event Processing Systems
2016
unpublished
Using the access-policy every incoming event can be secured. We can increase the processing of events by calculating the measure of obfuscation values for events. ...
Calculate the threshold for obfuscation as one of the part of access-policy and avoid the access requirements and events will be delivered more reliable. In this way we can deliver the more events. ...
We measure the threshold for obfuscation for attri-butes of events in every Correlation process obfusca-tion of attributes of events are produced is determined by proposed of access-policy consolidation ...
fatcat:6akluemj7bdfveojrmycsno4ry
Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations
2016
International Journal Of Engineering And Computer Science
The data may come from multiple origins in complex event processing systems and transmitted through multiple security authorities. ...
Present event processing systems are failing in conserving the privacy constraints of incoming event streams in a sequence of eventually applied stream operations. ...
For every correlation pace the obfuscation of event attributes in created event preservatives by the planned access policy consolidation protocol. ...
doi:10.18535/ijecs/v5i10.10
fatcat:nisrb3irlnahlbk3ktqsigh4pe
Reducing the energy cost of computing through efficient co-scheduling of parallel workloads
2012
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)
Efficient consolidation for parallel workloads is a challenging task as a number of factors, such as scalability, interthread communication patterns, or memory access frequency of the applications affect ...
One promising method for improving energy efficiency is co-scheduling applications on compute nodes. ...
Bus access based policy performs worst among all policies, since bus accesses per µOP does not necessarily capture the frequency of the bus accesses. ...
doi:10.1109/date.2012.6176641
dblp:conf/date/HankendiC12
fatcat:ylcdmoh6qjbexdoexd3y723rpu
Towards Virtualization Concepts for Novel Automotive HMI Systems
[chapter]
2013
IFIP Advances in Information and Communication Technology
Based on these requirements, we present the concept for a Virtualized Automotive Graphics System (VAGS ) that allows for the consolidation of mixed-criticality graphics ECUs. ...
First, we investigate relevant ISO standards and legal requirements and derive seven technical requirements for a virtualized automotive HMI system. ...
Acknowledgement This paper has been supported in part by the ARAMiS (Automotive, Railway and Avionics Multicore Systems) project of the German Federal Ministry for Education and Research (BMBF) with funding ...
doi:10.1007/978-3-642-38853-8_18
fatcat:eidt7zfoync5ncj7ivbycms4g4
A $(\rm UCON_{ABC})$ Resilient Authorization Evaluation for Cloud Computing
2014
IEEE Transactions on Parallel and Distributed Systems
The business-driven access control used in cloud computing is not well suited for tracking fine-grained user service consumption. ...
UCON ABC applies continuous authorization reevaluation, which requires usage accounting that enables fine-grained access control for cloud computing. ...
Usage Control and Policies Management The CPAP and SMCD (Fig. 7) convert SLA into rules for defining policies and access credentials (event RE) for users on the CD (event AU). ...
doi:10.1109/tpds.2013.113
fatcat:dkyogyvyz5fo7nwuhgyh4qowc4
Sustainable Implementation of Access Control
2018
Sustainability
The organization's policies and procedures are taken into consideration. ...
Sustainable implementation of access control implies approaches at different levels. ...
Any additional approach in consolidating a sustainable access control increases the robustness of the system. Thereby, the proposed demarche increases the capabilities of the overall security system. ...
doi:10.3390/su10061808
fatcat:j3lgm4xztvathgoewjoitzghqi
Towards Consolidated Presence
2010
Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
., the ability to automatically identify the status and availability of communication partners, is becoming an invaluable tool for collaboration in enterprise contexts. ...
In this paper, we argue for efficient presence management by means of a holistic view of both physical context and virtual presence in online communication channels. ...
Policies are typically formulated as event-condition-actions rules. ...
doi:10.4108/icst.collaboratecom.2010.48
dblp:conf/colcom/HauswirthEFGHJGHZPZ10
fatcat:4dcmxwwhfvfbfnhn7y2nze5nsq
Security Requirements in Healthcare
2005
Zenodo
Outline: • Risks • Requirements – Security requirements to the healthcare organizations – functional and non-functional requirements for security architectures • BHSSF example to illustrate ...
• Clinical systems are from all major vendors
• Separate user name and password for each
system
• ...
Processing
Records
Information Access
Control
Internal Audit
Personnel Security
Security
Configuration
Management
Security Incident
Procedures
Security
Management
Process
Termination ...
doi:10.5281/zenodo.3264199
fatcat:qzjkgghjp5gm3b7bxx7663rs4u
Archiving and Managing Remote Sensing Data using State of the Art Storage Technologies
2014
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Concurrent access by multiple systems is ensured for processing and generation of data products. ...
For this reason, it is useful to employ a shared file system which allows every processing system to directly access the same pool where raw images were stored. ...
Concurrent access by multiple systems is ensured for processing and generation of data products. Disk based systems provide high performance front-end for an archive. ...
doi:10.5194/isprsarchives-xl-8-1153-2014
fatcat:6xdt3wxxhretxaailn2lo3zxne
Architecture and prototype of a WLCG data lake for HL-LHC
2019
EPJ Web of Conferences
We will highlight how the system leverages its distributed nature, the economy of scale and different classes of storage to optimise the hardware and operational cost, through a set of policy driven decisions ...
The computing strategy document for HL-LHC identifies storage as one of the main WLCG challenges in one decade from now. ...
The test scenarios were run for two different workflows. The first workflow is CPU bound: downloads 40 MB of input and processes two events in approximately 5 minutes per event. ...
doi:10.1051/epjconf/201921404024
fatcat:hsh7eur4pzbyvlrjue7eqeh6vy
Disambiguation Solution for Persons' Accounts in Research Information Management Systems
2016
Indian Journal of Science and Technology
Novelty of the Study: The approach is suitable for systems with shared emails or user accounts. ...
In addition, they have calculated sensitivity for the process of person identification to the estimated amount of manual work on disambiguation. ...
If a corporate policy requires a deprecated person to be kept after consolidation, a person's log should contain an event about a consolidation saying that the person is a deprecated person (ID of the ...
doi:10.17485/ijst/2016/v9i43/101683
fatcat:47vr4umjqje53mo3coxexaxu5e
Stalled European Integration, the Primordialization of Nationalism, and Autocratization in Macedonia between 2008 and 2015
2017
Intersections
This paper examines the process of autocratization in Macedonia through an analysis of how an exogenous shock enabled internal formative events in that the ruling regime headed by Prime Minister Nikola ...
Gruevski commenced a process of primordialization of nationalism. ...
Slovenia) 4 to sign the Association and Stabilization Agreement with the European Union as a first step to accession. 5 This event was expected to pave Macedonia's way to full democratic consolidation ...
doi:10.17356/ieejsp.v3i4.342
fatcat:vpsfbdmaovbrtidpyeuag52zle
Using Registries to Identify Adverse Events in Rheumatic Diseases
2013
Pediatrics
Data access will be governed by the rigorous CARRA Data and Sample Sharing policies and overseen by the SOC. ...
and reporting Ensuring a reliable process for efficient detection and management of adverse events The SOC is responsible for the evaluation, adjudication, and appropriate notification and reporting of ...
doi:10.1542/peds.2013-0755
pmid:24144710
pmcid:PMC3813393
fatcat:hjbvnwtbtjav5jc3cj6qngbnd4
« Previous
Showing results 1 — 15 out of 156,306 results